New Pix scam carries out automated fraud
| | |

New Pix Scam Carries Out Automated Fraud | Understand And Know How To Avoid

Banking transactions that are carried out on a cell phone are at risk due to a new Pix scam that has surfaced. Essentially, the scheme consists of changing the address of the person who will receive the money. As such, the scheme is a variation of what is referred to as the ” Ghost Hand Scam “, in which the criminal manipulates a device without the consent of the user. In the case of the current trick, the difference is that it can now be applied in an automated manner without the hacker having to be online to implement the trick. Due to the use of automated transfer systems (ATS), the situation has changed due to the use of the ATS technique.

It is estimated that almost 6,000 victims will have already been attacked by this scam in Brazil by 2023, according to the security company Kaspersky. The data published by the organization indicates that based on the number of victims that the country is experiencing in the area of cell phone banking fraud is the fifth highest in the world – and the highest in the area of desktop banking fraud. Please read the following information regarding Pix’s new scam and learn how to avoid being targeted by it.

See also  How To Clean Out Recovery Drive in Windows 10/8/7?

How does the fraud work?

It would be accurate to say that financial Trojans (also known as Trojan horses) are malicious programs that are disguised as legitimate files or programs, and are used to steal data and money from devices and computers.

It is necessary for criminals to infect a victim’s cell phone with banking malware in order to execute the scam on them. As a disguise for the corrupted software, fake applications are downloaded outside of official stores. After the application has been installed, it will ask for accessibility permissions, which is a common feature of Android devices that is designed to help people with disabilities access the application. In order for the fake app to function, the user will have to accept a series of notifications, including an “update” announcement, which is of great importance to its operation. As a result of these actions, hackers are able to obtain access to a cell phone through this step.

In the event that ATS malware is used to do a pix, the screen is blocked until the transfer is complete. It is during this period of time that the app will click back and change the recipient of the transaction while the user waits. In view of the fact that this process is now automatic, the exchange takes place quickly, without raising too many suspicions in the process. Usually, the phishing scam is already applied to the user by the time the password entry screen appears. A common method of bypassing biometric authentication, such as one that uses fingerprints or facial recognition, is to use a strategy known as the ‘passive’ attack. Despite the fact that the screen on the cell phone is turned off, fraud can still occur even if the phone is turned off.

 

There are a number of ways to prevent fraud, and one of them is to use applications that can be found in official stores, which are generally considered reliable when it comes to protecting your personal data. There can be inconsistencies between parallel pages or they can even be fake ones. Further, non-PCD users should be very careful when using the accessibility permission as this permission is required for the majority of modern banking trojans to operate. In addition to ensuring that the device can be preserved, it is also advisable that two-factor authentication (2FA) is enabled on as many accounts as possible, but especially those that are connected to payment methods.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *